Search dblp for Publications

export results for "toc:db/journals/ijcysa/ijcysa2.bht:"

 download as .bib file

@article{DBLP:journals/ijcysa/AderinolaTA17,
  author       = {Timilehin B. Aderinola and
                  Aderonke F. Thompson and
                  Boniface K. Alese},
  title        = {Epidemic Response Model for Malware Defense on Computer Networks},
  journal      = {Int. J. Cyber Situational Aware.},
  volume       = {2},
  number       = {1},
  pages        = {69--84},
  year         = {2017},
  url          = {https://doi.org/10.22619/ijcsa.2017.100115},
  doi          = {10.22619/IJCSA.2017.100115},
  timestamp    = {Wed, 04 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcysa/AderinolaTA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcysa/BulloSS17,
  author       = {Alberto Bullo and
                  Eliana Stavrou and
                  Stavros Stavrou},
  title        = {Transparent password policies: {A} case study of investigating end-user
                  situational awareness},
  journal      = {Int. J. Cyber Situational Aware.},
  volume       = {2},
  number       = {1},
  pages        = {85--99},
  year         = {2017},
  url          = {https://doi.org/10.22619/ijcsa.2017.100116},
  doi          = {10.22619/IJCSA.2017.100116},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcysa/BulloSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcysa/DobsonSC17,
  author       = {Geoffrey B. Dobson and
                  Timothy J. Shimeall and
                  Kathleen M. Carley},
  title        = {Towards Network Science Enhanced Cyber Situational Awareness},
  journal      = {Int. J. Cyber Situational Aware.},
  volume       = {2},
  number       = {1},
  pages        = {11--30},
  year         = {2017},
  url          = {https://doi.org/10.22619/ijcsa.2017.100112},
  doi          = {10.22619/IJCSA.2017.100112},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcysa/DobsonSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcysa/FraunholzKAS17,
  author       = {Daniel Fraunholz and
                  Daniel Krohmer and
                  Simon Duque Ant{\'{o}}n and
                  Hans Dieter Schotten},
  title        = {{YAAS} - On the Attribution of Honeypot Data},
  journal      = {Int. J. Cyber Situational Aware.},
  volume       = {2},
  number       = {1},
  pages        = {31--48},
  year         = {2017},
  url          = {https://doi.org/10.22619/ijcsa.2017.100113},
  doi          = {10.22619/IJCSA.2017.100113},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcysa/FraunholzKAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcysa/HalesFA17,
  author       = {Gavin Hales and
                  R. Ian Ferguson and
                  Jacqueline Archibald},
  title        = {Insight: An Application of Information Visualisation Techniques to
                  Digital Forensics Investigations},
  journal      = {Int. J. Cyber Situational Aware.},
  volume       = {2},
  number       = {1},
  pages        = {100--118},
  year         = {2017},
  url          = {https://doi.org/10.22619/ijcsa.2017.100117},
  doi          = {10.22619/IJCSA.2017.100117},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcysa/HalesFA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcysa/Maric17,
  author       = {Jasmina Maric},
  title        = {The Valleys of Death in Refugee Crisis},
  journal      = {Int. J. Cyber Situational Aware.},
  volume       = {2},
  number       = {1},
  pages        = {49--68},
  year         = {2017},
  url          = {https://doi.org/10.22619/ijcsa.2017.100114},
  doi          = {10.22619/IJCSA.2017.100114},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcysa/Maric17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics